CODING Outline
The Method
The used method of the programs CODINGx, applying for a patent under the patent number DE 10 2005 033 390.7 A1 at the German patent office, is suitable for en-/decoding any data on place. The method is characterised by
Performance
The time-critical coding of mass data is a special challenge. This among other things arises in a real-time scenario, in which a continuous data stream has to be handled in
real time. Any delay by data processing being too slow causes a collapse and therefore cannot be used, i.e. it results in suspending the coding process.
The method CODING reduces the amount of multiplications being necessary to a
minimum being required for maintenance of complete safety even if data is of most homogeneous type (tested case: 1 GB binary zeroes). Because of this the processing speed being significant faster in comparison with other methods will be
achieved, where the CODING-method being more flexible than other methods simultaneously gives a higher safety (especially for t>1) on the other hand.
Operation Safety
Conventional coding systems as DES, Triple-DES, AES at fist are working with fixed block length, so shorter data first has to be expanded to such fixed length. At second
blocks of such systems are entangled, i.e. a defective block (e.g. by transmission error) makes the decoding of all following blocks impossible.
CODING however has no fixed block length. I.e. shorter information at the end of a dataset
is not expanded, so the length of the coded dataset is unchanged referring to the decoded data.
For the operation safety more essential is the fact that a damaged block don’t stop the decoding of the following blocks. Especially this is relevant for telephone
conversations (Voice over IP), in which a trouble in data stream hasn’t have the automatic consequence to put up the call completely new. Also transmitting other data with CODING, it is only necessary to send the incorrect block once
again. By modifying the here presented algorithm (e.g. retaining the restart point parameters of a defective block), the incorrect blocks can be processed later in a very fast and efficient way.
Encryption Safety
Even newer coding systems as AES use only a key with maximum length of 128 bits. In comparison already the simplest version of CODING (dimension t=1) uses a key with maximum length of 2048 bits (for dimension t=2 it already comprises 1,048,576 bits of maximum key length).
The method was submitted
to information scientists of the TU Darmstadt conducted by Prof. Dr. Johannes Buchmann to get a first judgement. According to that the method can’t be broken without trying out the most part of all possible keys one after the other. An
exact judgement of the safety especially in the view of information science (i.e. do you always need to check all possible keys for breaking a nontrivial key or can you reduce the number of possible keys to be checked) has to be left to a
detailed examination.
Not depend on this, the author has made extensive tests, which prove that even if data is of most homogeneous type (only binary zeroes) the method converges against the rectangular distribution of binary
zeroes/ones and bytes or byte groups respectively (special document see above).
Further near key judgements could show that even experimental keys differing in only one or few bits form original key don’t result in statistical relevant
changes of distributions in relation to the coding data. Also inspecting block differences and its distributions couldn’t discover relevant differences to block contents by chance.
Rather the method presented here can be said to be
safety even if besides the coding algorithm both the original data and the encoded data are known. It is impossible to derive the original key from these information (except testing all possible keys; see examination still be due).
The method CODING covers a (infinite) number of concrete coding processes. The dimension t of a process within CODING is defined as the number of bytes combined to a
byte-group. For t=1 single bytes are looked at and 1-byte transformation tables are used. For t=2 each 2 bytes are interpreted as a separate byte-group, for which 2-bytes transformation tables are used, etc.
The method CODING with regard to t is not limited, at the moment PC-/Unix-programs fit for use exist until t=3.
Power of Key Space
For t=1 approx. 3,2317*10616, for t=2 approx. 6,74114*10315.652, for t=3 approx. 10121.210.686,2336 possible key space elements exist!
The last
number is describable by a single 1 followed by zeroes, which occupy more than 33 volumes with 1000 pages, any of them with 3600 zeroes. It is easy to prove that at least (256t)!
elements of the key space can be really effective by the algorithms mentioned before (n!, speak ”n factorial” is defined as 1*2*3*...*n), simply the proof of the effectiveness of all elements of a key space is due (see above).
Under these circumstances t has to choose only ”big enough” to give nobody even with future conceivable (quantum) computers or computer farms any realistic possibility to decode with CODING encoded data without corresponding key or coding
parameters in acceptable time. At the moment this should be the case for t=3.
Characteristics
Development Status
The described method CODING has its beginning in preliminary examinations of the author approximately 19 years ago. The consistent development, generalization, and implementation in Free Pascal programs up to now for the dimensions t=1, t=2, and t=3 recently have been driven on the basis of changed requirements on part of the potential users and the possibilities of computers on part of the implementation.
The CODING programs are completely tested and fit for use for t=1, t=2, and t=3.
© Copyright 2006 SYSJM. All rights reserved.